Tagged Questions

Tor (short for The onion router) is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.

I am going to use Tails to connect to Tor through VPN which has AES-256 data encryption, SHA-256 data authentication and RSA-4096 handshake encryption on my Mac on my school's WiFi (as public as I can ...

Why it is not advisable to use JavaScript with Tor? Yet with JavaScript, you cannot get the IP address of the user except through an external website. How could using JavaScript with Tor expose one's ...

I've already asked this question here but as of yet it has no views/answers.
I was wondering if there is any way for Tor to detect high network usage in the context of transferring large files using ...

So I already created a .onion site but I want to change my address to something else, that is more than just symbols. I tried using shallot but that is not working and when I tried to install or find ...

Basically I want to do VPN -> tor, but with all outgoing traffic from the VPN server going through tor, and the Virtual Machines only on the VPN server, not on my PC. So I will have a VPN which will ...

YouTube is not available in my country, but I want to make an account at YouTube and use it. I'm not interested in protecting my identity. It is fine if anyone can monitor it. The thing I'm interested ...

I'm currently facing a key pinning error when trying to access the torproject.org website with Firefox.
Is anyone facing the same problem? Does anyone know if they changed their certificate? If not, ...

I'm currently running QubesOS (so essentially a virtualized Fedora operating system), which I use to access an offshore VPS through I2P (using garliccat). I then route all my traffic through the VPS ...

I realize this question more belongs on the tor exchange (and i have indeed posted it there) so if you want to vote to close this question I completely understand. But I have noticed that this site it ...

I'm not asking if Tor is secure, I'm asking if an observer can know you are using Tor? For example if a persons ISP or company network monitors traffic would they be able to determine with certainty ...

Here's a basic example of the situation I am in:
1.Friend downloads full-length, new release movie on shady internet site (felony).
2.Uploads it to a randomly created, cloud hosting service account ...

The most common justification for Tor is that people in countries like China that don't have full protections on free speech can use it to publish dissenting opinions or access foreign information. I ...

I believe Tor is an excellent tool to anonymise the internet usage. However as an admin, how can someone detect if Tor is being used on the network?
This becomes crucial in case of institutions like ...

TOR is fully secure only if I use HTTPS, right? But not every site supports it, so I had an idea - some online anonymizers support HTTPS, so if I connect via TOR (TOR - ANONYMIZER - site), will that ...

I have mobile devices (low power, low bandwidth) need to act as a proxy for certain types of P2P encrypted data, such as voting, bitcoin payment, or other specific-purpose usage, and I want to make ...

Does there exist, software or technology, that can use more than one wifi network, in such a way that only part of the data travels through each 'side'? You would probably need an end address like a ...

I am preparing a survey on Tor and its security. While searching for resources, I have come across with the paper Users Get Routed:Traffic Correlation on Tor by Realistic Adversaries. I comprehend the ...

I'm currently working in Kali and I'm trying to boost my security and anonymity online. Please, bear with me for I am no expert yet. Googling and searching here has yielded useful info but not enough ...

Google gets to know a user's IP when someone enters a captcha even if they are using tor (see http://www.wired.com/2014/12/google-one-click-recaptcha/). So, If I go to a non-google website, such as ...

From a security perspective, is visiting via the .onion address more/less secure?
I'm using Facebook as an example, but this question is really about any website which has both a 'normal' and a Tor ...

I'm looking into using a Raspberry Pi 2 between my Router and my Modem acting as an VPN and possibly a TOR gateway (two-in-one). It should just be out-of-the-way and passively/transparently route all ...

To me it seems that the only thing Tor is doing for anonymity (not security!) is the fact that it does not record the traffic in and out, because obviously if every router was recording the traffic ...

I'm considering running a Tor (non-exit) relay on my personal Ubuntu 14.04 computer at home (which also has my personal data on it).
I wanted to know if I should have any concerns about the security ...